Professional Documents
Culture Documents
2
Secure Shell
Secure Shell (SSH) functions as a type of tunneling
mechanism that provides terminal-like access to remote
computers.
SSH is a program and a protocol that can be used to log into
another computer over a network.
SSH provides authentication and secure transmission over
vulnerable channels like the Internet.
SSH is a program and a set of protocols that work together to
provide a secure tunnel between two computers.
3 types
Intranet – Within an organization
Extranet – Outside an organization
Copyright Remote
Pearson Access –2010
Prentice-Hall Employee to Business 6
Four Protocols used in VPN
PPTP -- Point-to-Point Tunneling Protocol
Raymond Panko
12
IPsec Operation: Transport Mode
1.
End-to-End
Security
(Good)
2. 3.
Security in Setup Cost
Site Network On Each Host
(Good) (Costly)
Raymond Panko
13
IPsec Operation: Tunnel Mode
2. 3.
No Security in No Setup Cost
Site Network On Each Host
(Bad) (Good)
Raymond Panko
Copyright Pearson Prentice-Hall 2010 15
The Figure shows the high-level view of the steps of
setting up an IPSec connection.
Raymond Panko
18
IPSEC (Internet Protocol Security)
When a device receives a packet via the IPSec protocol, it is
the SA that tells the device what to do with the packet. So if
device B receives a packet from device C via IPSec, device B
will look to the corresponding SA to tell it how to decrypt the
packet, how to properly authenticate the source of the packet,
which key to use, and how to reply to the message if
necessary.
Each device has an SPI that keeps track of the different SAs
and tells the device which one is appropriate to invoke for the
different packets it receives.
The SPI value is in the header of an IPSec packet, and the
device reads this value to tell it which SA to consult, as
depicted in the Figure.
IPSEC (Internet Protocol Security)